10.) Shellshock
10.) Shellshock
URL https://www.attackdefense.com/challengedetails?cid=1911
Important Note: This document illustrates all the important steps required to complete this lab.
This is by no means a comprehensive step-by-step solution for this exercise. This is only
provided as a reference to various commands needed to complete this exercise and for your
further research on this topic. Also, note that the IP addresses and domain names might be
different in your lab.
Solution:
Step 5: Use the Nmap NSE script to check if the server is vulnerable to shellshock attack.
Step 7: The GitHub link contains the steps to exploit the vulnerability.
URL: https://github.com/opsxcq/exploit-CVE-2014-6271
The attacker has to craft malicious user-agent in order to exploit the vulnerability.
Step 8: Configure Firefox to use Burp Suite. Click on the FoxyProxy plugin icon on the top-right
of the browser and select "Burp Suite"
Step 9: Start Burp Suite, Navigate to Web Application Analysis Menu and select "burpsuite".
Click on Next
Click on Start Burp button.
Step 10: Reload the page and intercept the request with Burp Suite.
Right-click and select “Send to Repeater” Option and Navigate to the Repeater tab.
Step 11: Modify the User-Agent and inject the malicious payload.